Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Complete Cyber Security Course! Volume 1: Hackers Exposed
Training Overview
Description of Training
Video Overview (2:18)
Section 1. Introduction
Welcome and Introduction to the Instructor! (2:06)
Security Quick Win! (11:59)
Goals and Learning Objectives - Volume 1 (2:30)
Target Audience (1:54)
Study Recommendations (5:16)
Course Updates (0:40)
Section 2. Know Yourself - The Threat and Vulnerability Landscape
Theory and Practical (1:08)
Goals and Learning Objectives (0:41)
Protect What You Value (4:37)
What is Privacy, Anonymity and Pseudonymity (4:35)
Security, Vulnerabilities, Threats and Adversaries (4:37)
Asset Selection (3:21)
Threat Modeling and Risk Assessments (7:51)
Security vs Privacy vs Anonymity - Can we have it all? (1:56)
Confidentiality, Integrity and Availability - (Security Attributes) (9:22)
Defense In Depth (1:36)
The Zero Trust Model (3:40)
Section 3. Know Your Enemy - The Current Threat and Vulnerability Landscape
Goals and Learning Objectives (0:43)
Why You Need Security – The Value Of A Hack (5:14)
The Top 3 Things You Need To Stay Safe Online (1:23)
Security Bugs and Vulnerabilities - The Vulnerability Landscape (9:35)
Hackers, Crackers and Cyber Criminals (2:32)
Malware, Viruses, Rootkits and RATs (6:52)
Spyware, Adware, Scareware, PUPs & Browser hijacking (4:44)
What is Phishing, Vishing and SMShing (15:06)
Spamming & Doxing (3:15)
Social engineering - Scams, cons, tricks and fraud (5:31)
CPU Hijackers - Crypto Mining Malware and Cryptojackers (8:42)
Darknets, Dark Markets and Exploit kits (8:01)
Governments, Spies and Secret Stuff Part I (5:13)
Governments, Spies and Secret Stuff Part II (10:35)
Regulating encryption, mandating insecurity & legalizing spying (14:37)
Trust & Backdoors (10:14)
Censorship (2:24)
Cyber Threat Intelligence – Stay Informed (1:12)
Section 4. Encryption Crash Course
Goals and Learning Objectives (0:24)
Symmetric Encryption (9:54)
Asymmetric Encryption (10:17)
Hash Functions (6:32)
Digital Signatures (4:45)
Secure Sockets Layer (SSL) and Transport layer security (TLS) (13:26)
SSL Stripping (12:02)
HTTPS (HTTP Secure) (6:59)
Digital Certificates (6:20)
Certificate Authorities and HTTPS (14:07)
End-to-End Encryption (E2EE) (1:57)
Steganography (8:12)
How Security and Encryption is Really Attacked (2:42)
Section 5. Setting up a Testing Environment Using Virtual Machines
Goals and Learning Objectives (0:27)
Introduction to Setting up a Testing Environment Using Virtual Machines (10:08)
Vmware (10:55)
Virtual box (12:03)
Kali Linux (2:50)
Section 6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)
Goals and Learning Objectives (0:37)
Security Features and Functionality (5:56)
Security Bugs and Vulnerabilities (5:31)
Usage Share (5:01)
Windows 10 - Privacy & Tracking (6:08)
Windows 10 - Disable Tracking Automatically (4:42)
Windows 10 - Tool : Disable Windows 10 Tracking (8:14)
Windows 10 – Cortana (2:59)
Windows 10 – Privacy Settings (9:40)
Windows 10 - WiFi Sense (4:16)
Windows 7, 8 and 8.1 - Privacy & Tracking (7:19)
Mac - Privacy & Tracking (4:28)
Linux and Unix “like” Operating Systems (3:30)
General Use Operating Systems (Windows, MacOS and Linux) (3:45)
General Use Operating Systems With a Security and Privacy Focus (Debian, Arch) (5:04)
Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS) (2:55)
Anonymity Focused Operating Systems (Tails and Whonix OS) (2:56)
Penetration Testing and Ethical Hacking Focused Operating Systems (0:49)
Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish) (2:31)
Linux - Debian 8 Jessie - Virtual box guest additions Issue (6:26)
Section 7. Security Bugs and Vulnerabilities
Goals and Learning Objectives (0:25)
The Importance of Patching (3:47)
Windows 7 - Auto Update (1:15)
Windows 8 & 8.1 - Auto Update (1:24)
Windows 10 - Auto Update (1:25)
Windows - Criticality and Patch Tuesday (3:46)
Windows 7, 8, 8.1 & 10 - Automate the pain away from patching (8:34)
Linux - Debian - Patching (10:58)
Mac - Patching (6:58)
Firefox - Browser and Extension Updates (4:23)
Chrome - Browser and Extension Updates (1:13)
IE and Edge - Browser and Extension Updates (0:46)
Auto updates - The Impact to Privacy and Anonymity (1:41)
Section. 8 Reducing Threat Privilege
Goals and Learning Objectives + Removing Privilege (2:53)
Windows 7 - Not using admin (3:32)
Windows 8 and 8.1 - Not using admin (4:14)
Windows 10 - Not using admin (3:25)
Section 9. Social Engineering and Social Media Offence and Defence
Goals and Learning Objectives (0:26)
Information Disclosure and Identity Strategies for Social Media (12:34)
Identify Verification and Registration (5:05)
Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1 (7:50)
Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2 (10:22)
Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons) (5:02)
Section 10. Security Domains
Goals and Learning Objectives (0:20)
Security Domains (10:00)
Section 11. Security Through Isolation and Compartmentalization
Goals and Learning Objectives (0:37)
Introduction to Isolation and Compartmentalization (2:10)
Physical and Hardware Isolation - How to change the Mac Address (7:10)
Physical and Hardware Isolation - Hardware Serials (11:18)
Virtual Isolation (8:36)
Dual Boot (2:41)
Built-in Sandboxes and Application Isolation (3:07)
Windows - Sandboxes and Application Isolation (5:57)
Windows - Sandboxes and Application Isolation - Sandboxie (11:29)
Linux - Sandboxes and Application Isolation (3:04)
Mac - Sandboxes and Application Isolation (6:33)
Virtual Machines (10:51)
Virtual Machine Weaknesses (10:31)
Virtual Machine Hardening (9:15)
Whonix OS - Anonymous Operating System (20:51)
Whonix OS - Weaknesses (4:18)
Qubes OS (19:07)
Security Domains, Isolation and Compartmentalization (4:42)
Section 12. BONUS - What's next?... Volume 2, 3 and 4
Important Information (0:46)
Congratulations (0:58)
Certificate of Completion for CPEs (0:56)
BONUS Lecture from Volume 2 - Router Vulnerability Scanning (Shodan, Qualys) (16:23)
BONUS Lecture from Volume 2 - Password Cracking part 2 (7:09)
BONUS Lecture from Volume 3 - Bypassing Firewalls and HTTP Proxies Part 3 (15:21)
BONUS Lecture from Volume 4 - Email Clients, Protocols and Authentication (13:17)
Audio Version of Training
Audio Download
Cyber Threat Intelligence – Stay Informed
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock